it is less of a problem for revoking attacker's keys (but maybe it has access to victim's contents?).
agreed it shouldn't be used to revoke non-malicious/your own keys
The poster you originally replied to is suggesting this for revoking the attackers keys. Not for revocation of their own keys…
The poster you originally replied to is suggesting this for revoking the attackers keys. Not for revocation of their own keys…